Stars
A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses …
An step by step fuzzing tutorial. A GitHub Security Lab initiative
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
nclv / CVE-2024-26229-BOF
Forked from apkc/CVE-2024-26229-BOFBOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel
nclv / AADInternals
Forked from Gerenios/AADInternalsAADInternals PowerShell module for administering Azure AD and Office 365
Decrypt Chromium based browser passwords with PowerShell.
office macro exploit builder 🚀 opensource & free excel word macro exploit builder - oneclick silent macro exploit docx excel word pdf macro exploit xls word macro exploit excel macro exploit onecli…
A curated list of GPT agents for cybersecurity
[Support 0.49.x](Reset Cursor AI MachineID & Bypass Higher Token Limit) Cursor Ai ,自动重置机器ID , 免费升级使用Pro功能: You've reached your trial request limit. / Too many free trial accounts used on this machi…
Project Date : Oct 2025 / Independent plugin: stream files into mounted VeraCrypt volumes and securely overwrite originals (unofficial)
Project Date : Aug 2025 / A modern, cross-platform secure file erasure engine designed for permanent data destruction with military-grade algorithms and SSD-optimized techniques.
Project Date : Feb 2022 / In this project, a flight controller software was coded using MPU6050 Gyro and BMP180 pressure sensors. The original drivers and PID algorithm and more were coded using HA…
Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are ignored. Please only use release tarballs from the QEMU website.
Project Date : Oct 2025 / PoC implementation for CVE-2025-54110 a Kernel-Level Integer Overflow Vulnerability in the Windows `NtQueryDirectoryObject` system call.
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,…
An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Claude) with comprehensive security testing modules for automat…
Top disclosed reports from HackerOne
Interact with your documents using the power of GPT, 100% privately, no data leaks
An open-source, code-first Go toolkit for building, evaluating, and deploying sophisticated AI agents with flexibility and control.
A Fast, Modular, and Scalable TLS/SSL Security Scanner Written in Rust
A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualization techniques. Built to operate both as a standalone Powe…